Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-26115 | Meitrack T366G-L GPS Tracker devices contain an SPI flash chip (Winbond 25Q64JVSIQ) that is accessible without authentication or tamper protection. An attacker with physical access to the device can use a standard SPI programmer to extract the firmware using flashrom. This results in exposure of sensitive configuration data such as APN credentials, backend server information, and network parameter |
| Link | Providers |
|---|---|
| https://github.com/NastyCrow/CVE-2025-51643 |
|
Thu, 02 Oct 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Meitrack t366l-g
Meitrack t366l-g Firmware |
|
| CPEs | cpe:2.3:o:meitrack:t366g-l_firmware:t366l_y24h131v039:*:*:*:*:*:*:* |
cpe:2.3:h:meitrack:t366l-g:-:*:*:*:*:*:*:* cpe:2.3:o:meitrack:t366l-g_firmware:t366l_y24h131v039:*:*:*:*:*:*:* |
| Vendors & Products |
Meitrack t366g-l
Meitrack t366g-l Firmware |
Meitrack t366l-g
Meitrack t366l-g Firmware |
Tue, 09 Sep 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Meitrack
Meitrack t366g-l Meitrack t366g-l Firmware |
|
| CPEs | cpe:2.3:h:meitrack:t366g-l:-:*:*:*:*:*:*:* cpe:2.3:o:meitrack:t366g-l_firmware:t366l_y24h131v039:*:*:*:*:*:*:* |
|
| Vendors & Products |
Meitrack
Meitrack t366g-l Meitrack t366g-l Firmware |
Thu, 28 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 | |
| Metrics |
cvssV3_1
|
Thu, 28 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Meitrack T366G-L GPS Tracker devices contain an SPI flash chip (Winbond 25Q64JVSIQ) that is accessible without authentication or tamper protection. An attacker with physical access to the device can use a standard SPI programmer to extract the firmware using flashrom. This results in exposure of sensitive configuration data such as APN credentials, backend server information, and network parameter | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-08-28T20:07:31.054Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-51643
Updated: 2025-08-28T20:07:25.686Z
Status : Analyzed
Published: 2025-08-28T16:15:35.207
Modified: 2025-10-02T18:51:17.823
Link: CVE-2025-51643
No data.
OpenCVE Enrichment
No data.
EUVD